Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 06:48

General

  • Target

    6bd16feb8afaf233a42210718585bd50N.exe

  • Size

    69KB

  • MD5

    6bd16feb8afaf233a42210718585bd50

  • SHA1

    ff4f241fec7bc9fb78e9113dc810c5612e084de9

  • SHA256

    0b9e90ec65521f009af7ebd8e75f21b152f511fab64d1da1ea50c47108a4f927

  • SHA512

    3783545b2ccfaf43de7832d0fe1dbcab7fa1b0481a9fd6110a29dec86db266de9f3b739884147e0cb03b5694687e3041d18e7cdc40d62fbeecb7675c3f1be6c1

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZvG:6NLWpCZIzjwHwU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3278) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bd16feb8afaf233a42210718585bd50N.exe
    "C:\Users\Admin\AppData\Local\Temp\6bd16feb8afaf233a42210718585bd50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    fa53bae5a1b1095564d197cdbd0f971c

    SHA1

    185e79bc24956b71f9ae9e8db0cf3d5b6427a64d

    SHA256

    4e760026d5c1df913387fcfcdfb5ace343e67ce69fadd4771f23ad43dc39d000

    SHA512

    ea68314d2332d97138cd3362f9098a1245f8e3df1521a0feaaff4bb4adbc147e0be9d0104da3b22edbbfb2148c0a10b3bdf7894f31923212300eeb674daaeffe

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    ee8506aae599d82859cb3cf30ff2b5a8

    SHA1

    c89b7c16e7545cb644dc18c5f33cc69631bcf801

    SHA256

    737fd9d45b3b46640b2e7e69c57679ae44fae48453a225cdeae6d634083d9ca0

    SHA512

    e8d231ce2b177f847a4f5802427c0d5563d4257bdfcee998b6fb7e9cd589c984129f47808f569923cfadc5cdb21a46aff5e529d35723277d4c1f15a99232c08e